Atiq khan
Wednesday, 22 July 2020
Neural network
One of the most powerful things about our brains is the way neurons allow us to learn. Computer scientists have been inspired by the way they work to make machines that learn too, programming networks of artificial neurons called neural networks In the past 10 years, the best-performing artificial-intelligence systems — such as the speech recognizers on smartphones or Google’s latest automatic translator — have resulted from a technique called “deep learning.”
Deep learning is in fact a new name for an approach to artificial intelligence called neural networks, which have been going in and out of fashion for more than 70 years. Neural networks were first proposed in 1944 by Warren McCullough and Walter Pitts, two University of Chicago researchers who moved to MIT in 1952 as founding members of what’s sometimes called the first cognitive science department.
Neural nets were a major area of research in both neuroscience and computer science until 1969, when, according to computer science lore, they were killed off by the MIT mathematicians Marvin Minsky and Seymour Papert, who a year later would become co-directors of the new MIT Artificial Intelligence Laboratory.
Friday, 30 August 2019
Thursday, 29 August 2019
SOFTWARE PIRACY AND ETHICAL HACKING
The act of copying software without being authorized for its uses its termed as software piracy if some needs to use particular software
He need to buy it's uses authentication one must kept in mind
That Laing before using permit it's uses how ever it does not make the owner of the particular software
Ethical is conducted
In an organizational manner the system and application that needs to be tested are determined by analysing requirement of client
Ethical hacker must follow the activity to ensure that ethical and moral rule are met
1. Take authorization permission and get a singed contract from the client that given
Permission to the tester to perform the test
Sign is non-disclosure agreement with the client
.in case of any confidential information need to be disclose during testing
Tuesday, 6 August 2019
HACKER BLACK HAT
A black hat hacker (or black-hat hacker) is a hacker who violates computer security for personal gain or maliciousness.
The
term's origin is often attributed to hacker culture theorist Aniket (though he denies coining it) to contrast the exploitative hacker with the white hat hacker who hacks protectively by drawing attention to vulnerabilities in computer systems that require repair.[2] The black hat/white hat terminology originates in the Western genre of popular American culture, in which black and white hats denote villainous and heroic cowboys respectively
Black hat hackers are the stereotypical illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal"
Black hat hackers break into secure networks to destroy, modify, or steal data, or to make the networks unusable for authorized network users
term's origin is often attributed to hacker culture theorist Aniket (though he denies coining it) to contrast the exploitative hacker with the white hat hacker who hacks protectively by drawing attention to vulnerabilities in computer systems that require repair.[2] The black hat/white hat terminology originates in the Western genre of popular American culture, in which black and white hats denote villainous and heroic cowboys respectively
Black hat hackers are the stereotypical illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal"
Black hat hackers break into secure networks to destroy, modify, or steal data, or to make the networks unusable for authorized network users
Wednesday, 29 May 2019
Anonymous is a decentralized international hacktivist group that is widely known for its various DDoS cyber attacks against several governments, government institutions and government agencies, corporations, and the Church of Scientology.
Membership: Decentralized affinity group
Motto: We Are Anonymous
Saturday, 18 May 2019
SECURITY MECHANISM
These are the step to prevent from hacking
.Encipherment
. Digital signature
.Access controle
.Authentication exchange
.Traffic podding
Encipherment
is type of security mechanism in Which we hide actual data and we do not show real and actual data
In another mechanism which is the
digital signature
it maintain the authenticity and intigirity in digital signature when sender send the data it generate a key and attached with message the key is only for authenticated receiver and when receiver get the message use the key to decode or decrypt it
Access control
In this mechanism we give the priority that which data is highly confidential and which is not and in this manner we control the access to data
and manage that which data are for public access and which data is private access
Authentication exchange
Authentication exchange are used for to identify the authenticated user by the information exchange
Traffic podding
In this mechanism we hide some data packet from the path so the hacker can not access full data in this mechanism hacker even do not understand what is actula source of data transmission
Routing control
To prevent hacking threat we use routing control it mean when we data transfer router uses many different way to get deliverd at destination in this hacker typically get access to data with help of routing control we can use different path for data transfer
.Encipherment
. Digital signature
.Access controle
.Authentication exchange
.Traffic podding
- .Routing control
Encipherment
is type of security mechanism in Which we hide actual data and we do not show real and actual data
In another mechanism which is the
digital signature
it maintain the authenticity and intigirity in digital signature when sender send the data it generate a key and attached with message the key is only for authenticated receiver and when receiver get the message use the key to decode or decrypt it
Access control
In this mechanism we give the priority that which data is highly confidential and which is not and in this manner we control the access to data
and manage that which data are for public access and which data is private access
Authentication exchange
Authentication exchange are used for to identify the authenticated user by the information exchange
Traffic podding
In this mechanism we hide some data packet from the path so the hacker can not access full data in this mechanism hacker even do not understand what is actula source of data transmission
Routing control
To prevent hacking threat we use routing control it mean when we data transfer router uses many different way to get deliverd at destination in this hacker typically get access to data with help of routing control we can use different path for data transfer
Wednesday, 15 May 2019
CRYPTOGRAPHY & SECURITY ATTACKS
First we discussed about what is cryptography
Its the secure communication from sender to receiver in the persence of third party by using encryption keys that is public key and private key if the data is ecrypted by using private then the message or data will be decrypted only with public key
And if the data is encrypted with the public key then it will be decrypted with private key it is the main concept of encryption and decryption
Security attacks in computer language its define as the unauthorized access to the system by sending sime malecious and virus there are two type of security attacks
● passive
Passive attack have two sub category
. Release of message content
. Traffic analysis
● active
In active attack data stolen from the middle of path and its able to modify and add some new bit with original message.
In the active attack message is not in its original form it becom crrupted
●Passive attacks
In this types of attack haker or intrudure only read the data it is not able to modify or edit the real message sender send the message and receiver authorizes to get message but third party steal the message from the path
By the help of traffic analysis
Hacker can track the path that from where the data is being send and to the whome it is being deliverd by the help of traffic analysis
Subscribe to:
Comments (Atom)
Neural network
One of the most powerful things about our brains is the way neurons allow us to learn. Computer scientists have been inspired by the way th...
-
One of the most powerful things about our brains is the way neurons allow us to learn. Computer scientists have been inspired by the way th...
-
Inheritance , polymorphism , Abstraction ,& Data encapsulation _____. We all ready discu...
-
A virtual private network (VPN) protects your data and identity over public networks, like the Internet and wireless hotspots. Vario...


